Question: Read Student Conduct Code and consider any place that mentions about technology. Scenario: A student has found a vulnerability in eSantaFe and try several tests
- Read Student Conduct Code and consider any place that mentions about technology.
- Scenario: A student has found a vulnerability in eSantaFe and try several tests to confirm it is a problem. They were unsure who to report it to so they reported it to SF through Facebook. Several weeks later they try again to see if the vulnerability has been fixed and discover it hasn't.
- Prompt: What actions have they taken that create potential issues and why? What would they likely be found guilty of according to the student conduct code? What should they have done differently?

19. Theft or other abuse of College information technology (IT) resources (computers, related technology, software, and facilities), including but not limited to intentional: a. Unauthorized access of a file and/or network for any purpose and/or introduction of a destructive program, including viruses. b. Any use of computer facilities and resources in violation of copyright law including but not limited to illegal file sharing, downloading, streaming, or transfer or facilitating others to download or stream copyrighted audio and/or video files without authorization. c. Unauthorized use of another individual's identification and/or password. d. Use of IT resources to access, send, display, print or transmit obscene, pornographic, harassing or discriminatory (for example, racist, sexist etc.), or abusive messages; e. Use of IT resources to interfere with normal operation of College computing systems and services or interfere with the work of another student or College employee. This includes unauthorized modification of the system setup of the College's computer teaching labs. f. Any other violation of the College "Information Technology Appropriate Use Policy (AUP)."
Step by Step Solution
3.41 Rating (164 Votes )
There are 3 Steps involved in it
Based on the Student Conduct Code and the scenario provided here are the potential issues the studen... View full answer
Get step-by-step solutions from verified subject matter experts
